dcsimg

Microsoft Office 365 vs Google Workspace (formerly G Suite) – Which is Best?

Microsoft Office 365 and G suite are both popular cloud-based storage and collaboration platforms that are used by many companies across the globe. They both come with a suite of applications for word processing, spreadsheets, emails, calendars, instant messaging and videoconferencing NOTE: On October 6, 2020, G Suite changed its name to Google Workspace, and Google have also made a number of … [Read more...]

Best Practices for Azure AD Security

Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management service. It allows employees to access data and applications, such as Office 365, Exchange Online, OneDrive, and more. An increasing number of organizations are migrating data from their on-premises AD environment to Azure AD, to take advantage of the benefits that cloud platforms provide. However, Azure AD … [Read more...]

How to Prevent Kerberoasting Attacks

Kerberos is an authentication protocol that uses tickets to provide strong authentication for client/server applications and became the default authentication method for Windows 2000 and later versions. The Kerberos protocol uses either symmetric-key or public-key cryptography to provide secure communication with other services and applications on the network. However, as with any widely adopted … [Read more...]

Is Your Data Secure in Office 365?

It is completely understandable why organizations are concerned about the security implications of storing large amounts of valuable data in the cloud. After all, they have no direct control over the policies, procedures and technologies that are used to safeguard their data from malicious actors, which includes safeguarding the data from the service provider’s own employees. However, it is … [Read more...]

Early Warning Signs of a Ransomware Attack

One of biggest challenges we face when it comes to protecting our networks from ransomware attacks is that there are very little warning signs that we can watch out for. A typical ransomware attack would arrive in the form of an email attachment, and as soon as the attachment is opened, the malicious program will begin encrypting the users’ files. There are, however, certain vulnerabilities … [Read more...]

What is SOX Compliance and What Are the Requirements?

The Sarbanes-Oxley Act of 2002 was passed by the United States Congress with the goal of providing security for consumers and the general public against corporations acting maliciously or carelessly. The general requirements of SOX compliance are geared towards ensuring that companies are transparent when it comes to financial reporting and that there are more official rules in place to prevent … [Read more...]

What is a Proxy Server and Are They Good for Security?

It is surprising how few people are aware that any time you load up a website or connect with another person online, your connection gives your “address” to that site/person. Naturally, when faced with this information, a lot of people are not happy with it. A combination of cyber security and general privacy concerns requires most schools, organizations and a lot of the general public to adopt … [Read more...]

The 15 Most Common Types of Cyber Attacks

A cyberattack is where an attacker tries to gain unauthorized access to an IT system for the purpose of theft, extortion, disruption or other nefarious reasons. Of course, a large number of security incidents are caused by insiders – whether through negligence or malice. However, for the sake of simplicity, let us assume that a cyber-attack is carried out by someone who is not, or was not, a … [Read more...]

What is SOAR and How Can it Help to Detect and Remediate Threats

SOAR stands for Security Orchestration, Automation and Response – a term that was first used by Gartner. These days organizations collect large amounts of data relating to events that take place on their networks, and these events can be generated by a wide range of devices, applications and platforms. This data needs to be aggregated and correlated to determine whether a security incident … [Read more...]

Are Permissions and Access Controls the Answer to Working From Home?

Even before the current health crisis began to unfold, a shift was taking place. Employers were allowing their staff to user their own devices in the workplace – a trend referred to as BYOD (Bring Your Own Device). It was a shift that made sense to many organizations as it eliminated the need to buy and maintain expensive devices and equipment. Employees tended to feel more comfortable using … [Read more...]